Netgear GS716Tv2 GS716Tv2/GS724Tv3 Software Admin Manual - Page 147

Access Rule Configuration, Refresh, Cancel, Apply, Security, Access, Access Control

Page 147 highlights

GS716Tv2 and GS724Tv3 Software Administration Manual Table 5-15. Profile Summary Fields (continued) Field Source IP Address Mask Priority Description Shows the IP Address of the client that may or may not originate management traffic. Shows the subnet mask associated with the IP address. Shows the priority of the rule. The rules are validated against the incoming management request in the ascending order of their priorities. If a rule matches, action is performed and subsequent rules below are ignored. 2. Click Refresh to update the page with the most current information. 3. Click Cancel to cancel the configuration on the screen and reset the data on the screen to the latest value of the switch. 4. If you change any of the settings on the page, click Apply to send the updated configuration to the switch. Configuration changes take effect immediately. Access Rule Configuration Use the Access Rule Configuration page to configure the rules about what systems can access the GS716T and GS724T Web interface and what protocols are allowed. To access the Access Rule Configuration page: 1. Click Security  Access, and then click the Access Control  Access Rule Configuration link. Figure 5-13 Managing Device Security v1.0, July 2009 5-21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

GS716Tv2 and GS724Tv3 Software Administration Manual
Managing Device Security
5-21
v1.0, July 2009
2.
Click
Refresh
to update the page with the most current information.
3.
Click
Cancel
to cancel the configuration on the screen and reset the data on the screen to the
latest value of the switch.
4.
If you change any of the settings on the page, click
Apply
to send the updated configuration to
the switch. Configuration changes take effect immediately.
Access Rule Configuration
Use the Access Rule Configuration page to configure the rules about what systems can access the
GS716T and GS724T Web interface and what protocols are allowed.
To access the Access Rule Configuration page:
1.
Click
Security
Access
, and then click the
Access Control
Access Rule Configuration
link.
Source IP Address
Shows the IP Address of the client that may or may not originate
management traffic.
Mask
Shows the subnet mask associated with the IP address.
Priority
Shows the priority of the rule. The rules are validated against the
incoming management request in the ascending order of their priorities.
If a rule matches, action is performed and subsequent rules below are
ignored.
Figure
5-13
Table
5-15. Profile Summary Fields (continued)
Field
Description